SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news
Partner content
Story image

In brief: What's on at CyberCrimeCon 2019 Singapore

By Sara Barker
Fri 29 Nov 2019
FYI, this story is more than a year old

The iconic CyberCrimeCon 2019 Singapore is happening on November 29, and it promises to be a jam-packed event full of threat analysis, world-class expertise, threat hunting tools, and best practices.

But you won’t find boring lectures, politics, unverified information, or second-hand data here – CyberCrime Con is all about bringing the reality of cybersecurity and cyber threats to life.

The event’s creators, Group-IB, are cybersecurity experts themselves and they’ve pooled their in-depth knowledge with leading speakers from INTERPOL, Palo Alto Networks,  and the Cybersecurity Agency of Singapore, amongst other leaders in the field.

So what can you expect from this year’s event on November 29, at Andaz by Hyatt Hotel, Singapore?  The conference is split into strategic and technology streams, so there's plenty of choice for everyone.

Here is a closer look at the schedule and each speaker’s discussion points.

Strategic stream

8:00 – 9:00


Cyberthreats: globalisation, trends and forecasts

9:00 – 9:15

Welcome Speech by Ilya Sachkov, CEO and Founder Group-IB

9:15 – 9:35

Building a Resilient and Trusted Cyber Environment in Singapore - Gaurav Keerthi, Assistant Chief Executive, CSA

He will share his insights on the digitalization of Singapore, recent trends observed in Singapore's cybersecurity landscape, and cybersecurity strategies adopted to build a resilient and trusted cyber environment for Singapore.

9:35 – 9:55

Reducing the Global Impact of Cybercrime - Craig Jones, Cybercrime Director, INTERPOL

He will discuss:

  • Overview of INTERPOL, its Global Cybercrime Program, and its mandate;
  • Key priorities of INTERPOL Cybercrime Directorate, including PPP, cyberthreat response, operations and capabilities development;
  • Other areas of cooperation with member states, Europol, International Organizations, CERTs;
  • Creation of the Cyber Incident Response Team.

9:55 – 10:15

Cyber Threat & Response Situation in Global and APAC region - Kazunori Yozawa, CTO, NTT

The NTT Security Operation Center (SOC) and Research centers analyze cyberthreats worldwide on a daily basis.

This presentation will highlight unique and challenging cybersecurity-related issues observed in the APAC region and beyond. Effective responses and solutions to enhance your organization's security will be discussed.

10:15 – 11:00

High-Tech Crime Trends 2019-2020 - Dmitry Volkov, CTO & Co-Founder, Group-IB

11:30 – 12:00

Cybercrime 2020: APTs are Nothing - Kunal Sehgal, Director - Cyber Resilience, A Global Bank

The world is focused on Advanced Persistent Threats (APTs), but organizations may need to shift their attention to a different type of threat—one that is not advanced but is nevertheless highly persistent. What happens when cybercrime becomes a commodity, a service within the reach of the masses?

Building a Cyber Resilience Strategy

12:00 – 12:30

The Bad Guys Are Scheming. It's Time to Join a Team - Cynthia Camacho, Vice President Community Development, Global Resilience Federation

You can't do it alone, even with the best technology and vendor sources. You need to be working with your industry peers to stay ahead of threat actors.

So, how can intelligence sharing be used to prevent threats, from affecting business resilience or mitigating attacks to minimizing impact and duration? GRF APAC will flag threats and actors targeting critical infrastructure in Singapore and Asia Pacific.

Then, Cynthia Camacho from GRF APAC will discuss the benefits of and processes for secure, trust-based information sharing, whether in one sector or many, and why it's the defense of the future.

12:30 – 12:50

The First and Last Line of Cyber Defense - Brian Hansen, Executive Director - Asia-Pacific, FS-ISAC

Hansen will discuss what it takes to be cyber resilient in the face of constant onslaughts from governments, APTs, criminal groups, and hacktivists. He will also recommend best practices for cybersecurity teams to overcome potential future threats.

12:50 – 13:10

5G Security Implementations – Concerns and Considerations - Chuan Wei Hoo, CISO, ST Engineering

Today, when it comes to cybersecurity, businesses are already struggling with LTE connectivity. What about 5G connectivity? This session will look at the potential benefits and security concerns relating to 5G connectivity. We will discuss and share some of the considerations when designing a secure solution.

Law enforcement vs. cybercriminals

13:10 – 13:30

Operational Activities Against Cybercrime - Takayuki OKU, Assistant Director, Cybercrime Directorate, INTERPOL

Assistant Director OKU will cover INTERPOL's operational activities and introduce the ASEAN Desk model and its global deployment. He will also present INTERPOL's Cyber Fusion Centre's work, the organization's various projects, and the ongoing campaign #BECareful (Business Email Compromise Awareness Campaign).

13:30 – 13:50

The Role of Law Enforcement in Digital Forensics & Cybercrime Investigations - Endo Priambodo, Police Superintendent, Head of Cooperation Unit, INP Cybercrime Directorate

Protecting against online fraud

14:40 – 15:00

Fostering Digital Trust – Tackling Cyber Enabled Fraud with a Unified Defense Strategy - Michelle Weatherhead, APAC Director, GBG

In the shift to connected consumers and digital banking, rapid digitization is a means to achieve revenue, customer experience and cost efficiencies uplift.

Modern banks demonstrate the ability to balance secure and frictionless digital customer engagements while managing real-time demands relating to risk decisions on fraud, cybersecurity, and transaction authorizations.

For digitization to be successful, it is necessary to choose the right tech partner offering a unified approach across fraud, AML, and cybersecurity, which will improve risk-related decision-making and accelerate quality transactions with customers.

GBG is the leading worldwide provider of data intelligence relating to fraud, identity, and location. Hear from Michelle Weatherhead, APAC Director at GBG, on how banks can achieve integration of fraud and cybersecurity operations to defend against complex financial and cyber crimes.

15:00 – 15:20

Online Brand Abuse: Latest Trends & Evolution of Fraud Methods - Ilya Rozhnov, Head of Brand Protection, Singapore HQ, Group-IB

Online scams that undermine brand reputation and cause companies to lose profits in the long term are developing in the same way as any other sphere of modern life. In order to effectively combat new challenges posed by online fraud, brands need to be aware of current brand abuse methods.

Technical stream

11:30 – 11:50

Artificial Intelligence in Сybersecurity - Alexander Lazarenko, Head of R&D Department, Group-IB

11:50 – 12:10

Rise of Commodity Malware - Stories From The Trenches - Vicky Ray, Principal Researcher - Unit 42, Palo Alto Networks

Cybercrime persists as an epidemic that continues to worsen every year, with associated impacts and losses on an alarming rise. Key contributing factors to the enormous growth of losses and the related impact from cybercrime have been the convenience, speed, and anonymity that the Internet provides to enable online crimes. In the growing cybercrime landscape, considerable attention is paid to high profile breaches and other more disrupting malware families, such as ransomwares.

However, the impact of malware such as Commodity RATs (Remote Access Trojans), which are bought and sold on easily accessible underground forums, can cause equal damage—if not more. This talk will cover some case studies shedding light on collaborative investigations when dealing with the ever-growing threat from such commodity malware.

12:10 – 12:30

Libertad y Gloria - A Mexican Cyber Heist Story - Frank Boldewin, Fiducia & GAD IT AG

This talk tells a story about a targeted attack on a bank that occurred earlier this year in Mexico. The case is interesting in many ways: unusual ATM malware, an unusual modus operandi, and a prime example of an OPSEC fail on the part of the victim, with a surprising twist at the end.

12:30 – 12:50

gh0st miner - Rustam Mirkasymov, Head of Dynamic Malware Analysis Department, Group-IB

How Chinese APT can utilize and then destroy your network

Hunting Trip: Technologies & Case Studies

12:50 – 13:10

Building Threat Hunting Team From Scratch - Nguyen Le, SOC Developer/Threat Hunter at NCSC VietNam

This talk is to share personal experiences of tackling and solving problems that arise during the planning and execution phases of building a Threat Hunting team.

13:10 – 13:30

Real-life Cases of Improving Threat Hunting Capabilities - Narudom Roongsiriwong, TB-CERT committee and CISO of Kiatnakin Bank

Logs are the digital footprint of activities at the points where events occur. Nowadays, we have to investigate large amounts of log data from various sources for threat hunting. This presentation will describe system design guidelines to make threat hunting more efficient in terms of detection time, accuracy of threat identification, and digital forensics.

13:30 – 13:50

Unconventional Threat Hunting: Tips & Case Studies - Vitaly Trifonov, Deputy Head of Digital Forensic Lab, Singapore HQ, Group-IB

14:40 – 15:00

Fingerpointing False Positives: How to Better Integrate Continuous Improvement into Security Monitoring - Desiree Sacher, Security Architect for a Security Operation Center, Finanz Informatik

This talk explains how to bring back intelligence to Security Monitoring. In security event management, all alerts are usually reviewed and classed as either true positive or false positive. The solution presented describes ways to document the company's security state that will help initiate improvement steps, without the need to purchase yet another product but by going beyond that old classification model.

By updating the analysis process, you will not only improve the company's security efficiency but also make a difference in analyst motivation by eliminating false alarms as part of a structured approach.

15:00 – 15:20

Group-IB Technologies in the Recent Cybercrime Investigations in the APAC Region - Vesta Matveeva, Head of Cyberinvestigation Department, Singapore HQ, Group-IB

Summary event details What: CyberCrime Con 2019 When: November 29 Where: Andaz by Hyatt Hotel, Singapore

To stay tuned and be first to know the news about the conference, follow Group-IB on Twitter.

Related stories
Top stories
Story image
Jamf introduces new content filtering solution for education providers
Jamf has announced the launch of Jamf Safe Internet, a new offering that looks to deliver a safe online experience to students while offering better management options for admins.
Story image
How organisations can mitigate IoT and IIoT security risks
IoT and IIoT come with inherent risks because they are often deployed faster than they can be secured, putting organisations in danger of cyber threats. Here are tips on how to mitigate those risks.
Story image
Colt launches new SASE Gateway solution with Versa
Colt Technology Services’ customers now have access to an integrated full SASE solution that brings together SD WAN and SSE features.
Story image
Remote Working
RDP attacks on the rise, Kaspersky experts offer advice
"Given that remote work is here to stay, we urge companies to seriously look into securing their remote and hybrid workforce to protect their data."
Story image
Artificial Intelligence
Abnormal Security finds financial supply chain under threat
New research by Abnormal Security has found a rising trend in financial supply chain compromise as threat actors increasingly impersonate vendors.
Story image
Identity and Access Management
Ping Identity launches corporate venture capital fund
Ping Identity has launched a corporate venture capital fund to foster innovative offerings for the identity security market.
Story image
Oracle Cloud
Commvault, Oracle to deliver Metallic Data Management as a Service
"We are excited to partner with Commvault and enable our customers to restore and recover their most mission-critical cloud data."
Story image
Threat actors ramp up their social engineering attacks
As people get better at identifying potential threats in their inbox, threat actors must evolve their methods. Their new M.O? Social engineering.
Story image
Amazon Web Services / AWS
Zscaler, AWS accelerate onramp to the cloud with zero trust
Zscaler has announced an extension to its relationship with Amazon Web Services, as well as innovations built on Zscaler's Zero Trust architecture.
Story image
Security driving customer identity & access management adoption
"CIAM allows businesses to embed a secure identity layer into their consumer and SaaS applications, facilitating secure, seamless end user experiences."
Story image
Tech job moves
Tech job moves - Bitdefender, Cohesity, Fortinet & MODIFI
We round up all job appointments from June 27-30, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Story image
New study reveals 51% of employees using unauthorised apps
The research shows that 92% of employees and managers in large enterprises want full control over applications, but they don't have it.
Story image
Artificial Intelligence
Eight top DevSecOps trends to support IT innovation in 2022
The use of DevSecOps practices is growing, as it is increasingly seen as the best way to produce high-quality and secure code. So what are the current trends?
Story image
Trend Micro
5G network projects driven by improving security and privacy
Trend Micro's new study reveals the prospect of improved security and privacy capabilities are the main motivations behind private 5G wireless network projects.
Story image
Digital Transformation
Cybersecurity priorities for digital leaders navigating digital transformation
In recent years, Asia-Pacific has especially been a hotspot for cyberattacks, and as we continue into 2022, it’s evident that the problem is becoming more significant.
Story image
Secure access service edge / SASE
Cloudflare adds new capabilities to zero trust SASE platform
New features for Cloudflare One include email security protection, data loss prevention tools, cloud access security broker, and private network discovery.
Story image
WatchGuard Technologies
Ransomware volume doubled 2021 total by end of Q1 2022
Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to a new report. 
Story image
Zero trust security adoption rises 27% in just two years
A survey of WAN managers has revealed that multi-factor authentication and single sign-on are the top zero trust features implemented.
Story image
Video: 10 Minute IT Jams - An update from CrowdStrike
Scott Jarkoff joins us today to discuss current trends in the cyber threat landscape, and the reporting work CrowdStrike is doing to prevent further cyber harm.
Story image
Aqua Security, CIS create software supply chain security guide
Aqua Securityand the Center for Internet Security have together released the industry’s first formal guidelines for software supply chain security.
Story image
Motorola Solutions
Motorola Solutions deploys communication system to 5th Japanese airport
Motorola Solutions with its partner, Nippon Airport Radio Services deployed the mission critical communication system to Kansai.
Story image
FIDO Alliance releases guidelines for optimising UX with FIDO Security Keys
The new guidelines aim to accelerate multi-factor authentication deployment and adoption with FIDO security keys.
Story image
HP Inc
Firmware attacks significant threat in age of hybrid work
Changing workforce dynamics are creating new challenges for IT teams around firmware security, according to new research.
Story image
Secureworks reveals new information on BRONZE STARLIGHT threat group
New research from Secureworks has uncovered new information on the Chinese threat group BRONZE STARLIGHT and how they are using targeted ransomware to initiate complicated attacks.
Story image
Artificial Intelligence
Juniper study reveals top AI trends in APAC region
Juniper's research shows an increase in enterprise artificial intelligence adoption over the last 12 months is yielding tangible benefits to organisations.
Story image
Cloud Security
Palo Alto Networks bolsters cloud native security offerings
Latest Prisma Cloud platform updates help organisations continuously monitor and secure web applications with maximum flexibility.
Story image
Network Security
Netskope announces zero trust network access updates
Customers can now apply zero trust principles across a range of hybrid work security needs, including SaaS, IaaS, private applications, and endpoint devices.
Story image
Internet of Things
ManageEngine wins big in IDC MarketScape assessment
ManageEngine's Endpoint Central service has been recognised as a leader by IDC MarketScape in several categories including Internet of Things device deployments and UEM software for SMEs.
Story image
Gartner's top recommendations for security leaders
"Leaders now recognise that major disruption is only one crisis away. We can’t control it, but we can evolve our thinking, philosophy, program and architecture.”
Story image
IT and security team collaboration crucial to data security
Many IT and security decision makers are not collaborating as effectively as possible to address growing cyber threats.
Find out how you and your business can prevent being caught out by everything from ransomware to cryptojacking.
Link image
Story image
Vulnerable APIs costing businesses billions every year
Large companies are particularly vulnerable to the security risks associated with exposed or unprotected APIs as they accelerate digital transformation.  
Story image
Tech job moves
Tech job moves - ActiveCampaign, Arcserve, LogRhythm & Qlik
We round up all job appointments from June 17-22, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Email threats spike 101%, remains a top attack vector
"Each year we see innovation in the threat landscape, but each year email remains a major threat to organisations."
Story image
Progress launches latest version of network visibility solution
In Flowmon 12 network solution, Progress has expanded its support for public cloud provider flow log monitoring and launched new features.
Story image
Artificial Intelligence
Vectra AI named as AWS security competency partner
Threat detection and response company Vectra AI has announced that it has become an Amazon Web Services Security Competency Partner.
Story image
Industry-first comprehensive risk-based API security enhances protection
Application Programming Interfaces (APIs) have become a crucial part of operating web and mobile application businesses and are causing significant economic growth in the digital sector.
Story image
Digital Transformation
What CISOs think about cyber security, visibility and cloud
Seeking to uncover the minds of CISOs and CIOs across Asia Pacific, my company recently asked Frost & Sullivan to take a snapshot of cloud adoption behaviour in the region.
Story image
Internet of Things
Domino's Pizza: A blueprint for secure enterprise IoT deployment
Increasingly, organisations are embracing smart technologies to underpin innovations that can enhance safety and productivity in every part of our lives, from industrial systems, utilities, and building management to various forms of business enablement.
Story image
Delinea’s Joseph Carson recognised with OnCon Icon Award
Delinea chief security scientist and advisory CISO Joseph Carson has been recognised as a Top 50 Information Security Professional in the 2022 OnCon Icon Awards.
Story image
Preparing for the digital decade with the right workforce strategies
For a decade that started under the pall of the pandemic, the 2020s is poised to end with a bang with the digital economy swelling to a high across the world.
Story image
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
Story image
Significant security concerns resulting from open source software ubiquity
"The risk is real, and the industry must work closely together in order to move away from poor open source or software supply chain security practices."